Information disclosure in Cisco ASA 5500-X Series - CVE-2017-6752
Published: August 3, 2017 / Updated: July 20, 2018
Vulnerability identifier: #VU7675
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-6752
CWE-ID: CWE-200
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco ASA 5500-X Series
Cisco ASA 5500-X Series
Detailed vulnerability description
The vulnerability allows a remote unauthenticated attacker to obtain potentially sensitive information on the target system.
The weakness exists in the web interface of the Cisco Adaptive Security Appliance (ASA) due to the interaction between Lightweight Directory Access Protocol (LDAP) and SSL Connection Profile when they are configured together. A remote attacker can perform a username enumeration attack to the IP address of the device, determine valid usernames and conduct additional reconnaissance attacks.
Successful exploitation of the vulnerability results in information disclosure.
The weakness exists in the web interface of the Cisco Adaptive Security Appliance (ASA) due to the interaction between Lightweight Directory Access Protocol (LDAP) and SSL Connection Profile when they are configured together. A remote attacker can perform a username enumeration attack to the IP address of the device, determine valid usernames and conduct additional reconnaissance attacks.
Successful exploitation of the vulnerability results in information disclosure.
How to mitigate CVE-2017-6752
The vulnerability is addressed in the following versions: 10.0.13(0.161), 10.0.11(0.76), 10.0.8(40.131), 9.9.1(20.20), 9.9.1(10.4), 9.8.1(12.54), 9.8.1(1.114), 9.8.1(0.8), 9.7.1(0.153), 9.6.2(0.132), 9.8(0.99), 9.7(1.5), 9.6(3.2), 9.4(4.6), 9.2(4.21), 9.1(7.17).